Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
439s -
max time network
442s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2022, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
doc2022001001001.pdf.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
doc2022001001001.pdf.exe
Resource
win10v2004-20220722-en
General
-
Target
doc2022001001001.pdf.exe
-
Size
1.2MB
-
MD5
39b7ffa8957fe5a6ca72cca183a67d42
-
SHA1
41b478d0dbf80cf8a6fffc1b14230c193ae124e5
-
SHA256
3879b7d1e92d9b91e94c83e35421b6b64c1e529e28335962c1da8626b0a29d83
-
SHA512
43ebc7daf28ebf5ebc8016533e26b13d1e185610690badcf613af20f6e3ff66d7c0adc71dec714c50c06359182f421f3cf05983af2252c5fdd8375c1fa2631e2
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5420760971:AAH01qjNE4a_MymOsvjAcXOxeYA3Wd9XCkE/sendMessage?chat_id=1856108848
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation doc2022001001001.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4500 set thread context of 2408 4500 doc2022001001001.pdf.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3468 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4500 doc2022001001001.pdf.exe 4500 doc2022001001001.pdf.exe 4500 doc2022001001001.pdf.exe 4500 doc2022001001001.pdf.exe 4500 doc2022001001001.pdf.exe 4592 powershell.exe 4500 doc2022001001001.pdf.exe 4592 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4500 doc2022001001001.pdf.exe Token: SeDebugPrivilege 4592 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2408 doc2022001001001.pdf.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4500 wrote to memory of 4592 4500 doc2022001001001.pdf.exe 91 PID 4500 wrote to memory of 4592 4500 doc2022001001001.pdf.exe 91 PID 4500 wrote to memory of 4592 4500 doc2022001001001.pdf.exe 91 PID 4500 wrote to memory of 3468 4500 doc2022001001001.pdf.exe 93 PID 4500 wrote to memory of 3468 4500 doc2022001001001.pdf.exe 93 PID 4500 wrote to memory of 3468 4500 doc2022001001001.pdf.exe 93 PID 4500 wrote to memory of 3108 4500 doc2022001001001.pdf.exe 95 PID 4500 wrote to memory of 3108 4500 doc2022001001001.pdf.exe 95 PID 4500 wrote to memory of 3108 4500 doc2022001001001.pdf.exe 95 PID 4500 wrote to memory of 2408 4500 doc2022001001001.pdf.exe 96 PID 4500 wrote to memory of 2408 4500 doc2022001001001.pdf.exe 96 PID 4500 wrote to memory of 2408 4500 doc2022001001001.pdf.exe 96 PID 4500 wrote to memory of 2408 4500 doc2022001001001.pdf.exe 96 PID 4500 wrote to memory of 2408 4500 doc2022001001001.pdf.exe 96 PID 4500 wrote to memory of 2408 4500 doc2022001001001.pdf.exe 96 PID 4500 wrote to memory of 2408 4500 doc2022001001001.pdf.exe 96 PID 4500 wrote to memory of 2408 4500 doc2022001001001.pdf.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\doc2022001001001.pdf.exe"C:\Users\Admin\AppData\Local\Temp\doc2022001001001.pdf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svsbbPBTQBkgEG.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\svsbbPBTQBkgEG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp72E9.tmp"2⤵
- Creates scheduled task(s)
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\doc2022001001001.pdf.exe"C:\Users\Admin\AppData\Local\Temp\doc2022001001001.pdf.exe"2⤵PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\doc2022001001001.pdf.exe"C:\Users\Admin\AppData\Local\Temp\doc2022001001001.pdf.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52e2a8dd6b1406dfedcfbe4767fe0ba57
SHA1dd0d51d27df3e87bd0b1013e3b39555e0fceecb2
SHA256c21e11749958d10f614da13659c045c0723bb4f10f3f7b86e57ccb8b18a5fc1d
SHA5122a8ece7739ed17ceb2863580a49c3b8512e25fe9f7a74d38e69cf751a84fdb411e49ac4937be6eac462a2e5c184019a98ac3856bf5b72dd8cff0b94ea6391242